1. July 27, 2022

    Operates on the Transport Layer of the OSI model Reliable, full featured transport layer protocol Divides data into segments TCP Header…

  2. February 19, 2022

    Fully managed, highly available with replication across 3 AZs NoSQL database Scales to massive workloads Millions of requests per second…

  3. February 19, 2022

    To get managed Redis/Memcached In-memory databses with really high-performance, low latency Using elasticache involves heavy application…

  4. February 19, 2022

    AWS EC2, EBS & EFS EC2 User data Possible to bootstrap instances using a User Data script Only run once Used to automate tasks such as…

  5. February 19, 2022

    Vertical Scalability scaling size of instance Horitontal Scalability increasing no. of instances High Availablity Running application in…

  6. February 19, 2022

    ECS Clusters logical groupings of EC2 instances instances run the ECS agent ECS agents register the instance to the cluster EC2 instances…

  7. February 19, 2022

    AWS KMS Easy way to control access to data - AWS manages keys Fully integrated with IAM Seamlessly integrated into EBS, S3, Redshift, RDS…

  8. February 19, 2022

    Allows storage of objects (files) into buckets Must have globally unique name Naming convention No uppercase No underscores 3-63 characters…

  9. February 19, 2022

    Used to decouple applications Unlimited throughput Default retention, unlimited no. of messages in queue Low latency (< 10ms on publish…

  10. February 19, 2022

    Model your workflows as state machines (one per workflow) Order fulfillment, data processing Web applications, any workflow Written in JSON…

  11. February 19, 2022

    Private network to deploy your resources Subnets allow you to partition your network inside your VPC Public subnets are accessible from the…

  12. February 19, 2022

    Event producer that sends messages to one SNS topic Event recievers listen to the SNS topic and will get all the messages Up to 10,000,00…

  13. February 19, 2022

    Identity-based policies Attach managed and inline policies to IAM identities (users, groups to which users belong, or rules). Grant…

  14. February 19, 2022

    Makes it easy to collect, process and analyse streaming data in real-time Kinesis Data Streams: Capture, process and store data streams…

  15. February 19, 2022

    Visual analysis of our applications Troubleshooting performance bottlenecks Understand dependancies in a microservice architecture Pinpoint…

  16. February 16, 2022

    Root account created by default - shouldn’t be shared Users are prple within organisation and can be grouped Groups only contain users not…

  17. February 15, 2022

    A closure is a function which contains its own lexical environment. It gives you access to the outer functions scope from an inner function…

  18. February 15, 2022

    Arrays are converted to strings and then concatenated. As there are no elements in either of these arrays the concatenation is which is…

  19. February 15, 2022

    Types Tuple Null and undefined types and are subtypes of all other types, so can be assigned to or only when the flag is not used if…

  20. February 14, 2022

    Nothing exciting here really...

© 2022 JLavs Notes